Thu.Jan 02, 2025

article thumbnail

Finland Suspects Eight in Deep-Sea Cable Sabotage Incident

Data Breach Today

Suspect Crew Members of the Eagle S Cannot Leave the Ship Finnish police say they've identified as suspects eight crew members of an oil tanker linked to a Russian "shadow fleet" of sanctions busting ships in an investigation into an incident that broke submarine cables in the Baltic Sea. Authorities escorted the tanker into Finnish waters on Dec. 25.

147
147
article thumbnail

5 lightweight Linux distributions with very low system requirements

Collaboration 2.0

If you have an aging computer and want to give it new life, there are plenty of lightweight Linux distributions that will serve you for years to come.

IT 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'DoubleClickjacking' Threatens Major Websites’ Security

Data Breach Today

Flaw Bypasses Clickjacking Defenses, Enables Account Takeovers Hackers are exploiting the split-second delay between two mouse clicks to carry out sophisticated clickjacking attacks, tricking victims into authorizing transactions or granting access they never intended.

Security 147
article thumbnail

Building Information Governance in the Age of Data Lakes

AIIM

When Systems Don't Talk to Each Other In my organization, we have dozens of corporate systems, and all of them do really important things as part of the work of the organization. But if somebody wants to ask a question like, "How are we providing services into a particular community?" and "What are the types of services in a particular community we're offering over time?

article thumbnail

Enterprise ABM Marketing Tools: A Marketer's Guide

Savvy B2B marketers know that a great account-based marketing (ABM) strategy leads to higher ROI and sustainable growth. In this guide, we’ll cover: What makes for a successful ABM strategy? What are the key elements and capabilities of ABM that can make a real difference? How is AI changing workflows and driving functionality? This Martech Intelligence Report on Enterprise Account-Based Marketing examines the state of ABM in 2024 and what to consider when implementing ABM software.

article thumbnail

Breach Roundup: MetLife Denies RansomHub Cyberattack Claims

Data Breach Today

Also: German Prosecutors Charge Three Alleged Russian Saboteurs This week, MetLife denied a RansomHub cyberattack claim, RI Health System cyberattack update, npm package deployed Quasar RAT, Germany charges three with espionage for Russia, North Koreas contagious interview campaign deployed new malware.

147
147

More Trending

article thumbnail

Cryptohack Roundup: Cambodia's New Crypto Directive

Data Breach Today

Animoca Brands Co-Founder's Social Media Hacked This week, Cambodia introducing new crypto directive, a hacker compromising Animoca Brands co-founder's social media, FTX co-CEO having his sentence reduced by a year, IRS pushing new crypto tax reporting rules and the Blockchain Bandit moving funds after two years of inactivity.

article thumbnail

How I easily added AI to my favorite Microsoft Office alternative

Collaboration 2.0

If you're a fan of OnlyOffice Desktop Editors and AI, you'll be thrilled to know those two things have come together to make your life a bit easier. Here's how I did it in four easy steps.

IT 108
article thumbnail

A Mixed Bag for Cybersecurity Stocks in 2024 as Paths Differ

Data Breach Today

Data Protection, Firewall Stocks Surge as Vulnerability Management Stocks Struggle Fortunes diverged for publicly-traded cybersecurity companies in 2024, as the technology category they played in and market share they held largely determined their fate. Investors last year looked favorably upon companies in the data protection space, with Commvault and Rubrik recording big gains.

article thumbnail

Where AI educators are replacing teachers - and how that'll work

Collaboration 2.0

Unbound Academy is introducing a virtual school-without-teacher model. A handful of human 'guides' are standing by just in case.

Education 104
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Ex-Terraform CEO Extradited to US Over Crypto Fraud Charges

Data Breach Today

Do Hyeong Kwon Extradited to US For Allegedly Defrauding Investors Out of Billions Authorities say Do Hyeong Kwon, former CEO of Terraform Labs, appeared in a Manhattan federal courtroom Thursday after facing extradition from Montenegro over allegations he defrauded investors out of billions of dollars while misrepresenting his companys cryptocurrency and other products.

130
130
article thumbnail

Microsoft Can Fix Ransomware Tomorrow

Adam Shostack

My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow. My latest article at Dark Reading is Microsoft Can Fix Ransomware Tomorrow. It starts: Recently, I was at a private event on security by design. I explained that Microsoft could fix ransomware tomorrow, and was surprised that the otherwise well-informed people I was speaking to hadn't heard about this approach.

article thumbnail

What's in HHS' Proposed HIPAA Security Rule Overhaul?

Data Breach Today

Experts: New Mandates Could Be Difficult, Costly for Many Entities The U.S. Department of Health and Human Services' proposed overhaul of the 20-plus-year-old HIPAA Security Rule aims to drastically improve the state of healthcare sector cybersecurity, but the potential new requirements could mean difficult and expensive heavy lifting for many regulated entities.

Security 130
article thumbnail

Tax-Themed Phishing Campaign Delivers Malware Via Microsoft Management Console Files

KnowBe4

Securonix warns that tax-themed phishing emails are attempting to deliver malware via Microsoft Management Console (MSC) files.

Phishing 102
article thumbnail

4 AI Hacks to Make Sales Teams More Efficient

Over the last two years, there’s been a 76 percent increase in AI adoption across sales organizations. The reason for its rise? AI increases teams’ productivity by predicting and automating actions that require manual effort. In other words, the research that takes reps hours, AI can do in seconds. For sales teams, AI opens up a world of new possibilities, including automating outreach, identifying best-fit buyers, and keeping CRMs flush with fresh data.

article thumbnail

Chinese Hack Breached US Sanctions Office in Treasury Attack

Data Breach Today

Hackers Reportedly Target Treasury Department Offices Overseeing Economic Sanctions A Chinese hack of the U.S. Department of Treasury targeted offices tasked with overseeing economic sanctions and financial investigations, as experts warn Beijing is increasingly escalating attacks on American critical infrastructure while preparing for potential future conflict.

130
130
article thumbnail

I invested $50 in Bitcoin in 2022, and it's been a ride. Here's how much I have now

Collaboration 2.0

Bitcoin dropped, crashed, and burned - then it skyrocketed. My $50 investment went through the wringer. Here's how 2024's halving event and political shifts turned massive losses into unexpected gains.

IT 102
article thumbnail

The EDPB Opinion on training AI models using personal data and recent Garante fine – lawful deployment of LLMs

Data Protection Report

The final days of 2024 were very eventful in the world of AI and data protection: the European Data Protection Board ( EDPB ) published its Article 64 General Data Protection Regulation ( GDPR) opinion on training AI models using personal data (the EDPB Opinion). Two days later, the Italian Garante per la Protezione dei Dati Personali ( Garante ) announced a fine of 15 million and corrective measures imposed on OpenAI.

article thumbnail

Apple settles Siri lawsuit for $95 million - here's how much you could get

Collaboration 2.0

The class action privacy suit contends that Siri recorded and shared Apple users' conversations. Apple isn't the only tech giant in the crosshairs of such legal action.

Privacy 95
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

DoubleClickjacking allows clickjacking on major websites

Security Affairs

The “DoubleClickjacking” exploit bypasses protections on major websites, using a double-click sequence for clickjacking and account takeover attacks. DoubleClickjackingis a technique that allows attackers to bypass protections on major websites by leveraging a double-click sequence. Attackers can exploit the technique to facilitate clickjacking attacks and account takeovers on almost all major websites.

article thumbnail

Use the Defcon Wifi

Adam Shostack

Why its ok to use the Defcon wifi Many security professionals, especially on social media, have an unfortunate tendency towards what we might call performative security. Its where people broadcast their security measures to show how aware they are, and they suggest others follow their lead. Its the inverse of security theater where ineffective security is imposed on us by organizations.

article thumbnail

Getting real with AI and security in 2025

Jamf

Four of Jamfs leaders share their ideas on what will dominate tech discourse in the year ahead.

article thumbnail

This low-cost Lenovo PC is the desktop I recommend to most people - even though its made for gamers

Collaboration 2.0

The Lenovo LOQ Tower 17IRR9 is a solid little machine capable of handling most workloads. And the best part is that it's fairly inexpensive for the specs.

IT 84
article thumbnail

How to Create Sales Email Sequences That Convert

Modern go-to-market teams know it takes more than one email to break through the noise. Multiple touchpoints means more ways to get your pitch right — and, potentially, more ways to be wrong. The good news? Once you know how to write compelling, one-off emails to entice prospective customers, you can easily do the same across a short sequence of emails.

article thumbnail

The State of Appsec in 2024

Adam Shostack

2024 is bringing lots of AI, and Liability, too At the start of 2024, appsec is moving through two major inflection points: liability and AI. The first has two facets: how do we secure AI systems, and how do we use AI in appsec? The second major inflection is driven by governments re-arranging liability from software operators to software makers. And as I think about where we are in 2024, Im optimistic and hopeful because of a third change, much more nascent, that lays groundwork for assessing a

article thumbnail

ZDNET joins CNET Group to award the Best of CES, and you can submit your entry now

Collaboration 2.0

Our experts will sift through the thousands of CES exhibitors to find the best tech and bring it to you.

IT 81
article thumbnail

Threat Modeling Google Cloud (Threat Model Thursday)

Adam Shostack

NCC has released a threat model for Google Cloud Platform. What can it teach us? In Threat Modelling Cloud Platform Services by Example: Google Cloud Storage Ken Wolstencroft of NCC presents a threat model for Google Cloud Storage, and Id like to take a look at it to see what we can learn. As always, and especially in these Threat Model Thursday posts, my goal is to point out interesting work in a constructive way.

Cloud 98
article thumbnail

Exclusive: Incase announces new Keyboard that Microsoft designed (but never released)

Collaboration 2.0

I sat down with Incase's CEO to discuss how a brand known for Apple accessories resurrected Microsoft's discontinued peripherals -- starting with an unreleased ergonomic keyboard.

80
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Safety and Security in Automated Driving

Adam Shostack

Lets explore the risks associated with Automated Driving. " Safety First For Automated Driving " is a big, over-arching whitepaper from a dozen automotive manufacturers and suppliers. One way to read it is that those disciplines have strongly developed safety cultures, which generally do not consider cybersecurity problems. This paper is the cybersecurity specialists making the argument that cyber will fit into safety, and how to do so.

article thumbnail

This quick Mac tip saves me time and clicks all day long

Collaboration 2.0

Here's a more efficient way to switch window focus in MacOS and why you should try it.

IT 78
article thumbnail

Handling Pandemic-Scale Cyber Threats (preprint)

Adam Shostack

A new paper on 'Pandemic Scale Cyber Events Josiah Dykstra and I have a new pre-print at Arxiv, Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19. The abstract is: The devastating health, societal, and economic impacts of the COVID-19 pandemic illuminate potential dangers of unpreparedness for catastrophic pandemic-scale cyber events.

Paper 52